vusec / pandacapLinks
A framework for streamlining the capture of PANDA execution traces.
☆57Updated 5 years ago
Alternatives and similar repositories for pandacap
Users that are interested in pandacap are comparing it to the libraries listed below
Sorting:
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 4 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- Demos of and walkthroughs on in-browser fuzzing using WebAssembly☆122Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Default query sets for Joern☆26Updated 4 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆132Updated 6 years ago
- ☆64Updated 6 years ago
- SAFE embeddings to match functions in yara☆100Updated 5 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 5 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆58Updated 6 years ago
- TaintInduce is a project which aims to automate the creation of taint propagation rules for unknown instruction sets.☆59Updated 4 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Updated 4 years ago
- ☆15Updated 5 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 8 years ago
- tool for multi-execution jump coverage introspection☆67Updated 9 months ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated 2 years ago
- ☆96Updated 6 years ago
- GUSTAVE is a fuzzing platform for embedded OS kernels. It is based on QEMU and AFL (and all of its forkserver siblings). It allows to fuz…☆201Updated 4 years ago
- ☆82Updated 3 months ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Updated 4 years ago
- ☆25Updated 3 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 5 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 4 years ago
- KLEE Symbolic Execution Engine☆60Updated 6 years ago
- Boring tool to launch multiple afl-fuzz instances☆52Updated 8 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆76Updated 3 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Updated 9 years ago
- Utilities for generating dynamic traces☆93Updated 8 months ago
- Signedness-Agnostic Strided-Interval☆38Updated 6 years ago